Exam Questions And 100% Correct
Answers.
What does IP stand for? - Answer Internet Protocol
What does IP do? - Answer Provides addressing
What does TCP stand for? - Answer Transmission control Protocol
Physical devices such as transceivers, modems, CSU/DSU are part of what network layer? - Answer
Layer 1
What layer do MAC addresses operate on? - Answer The data link layer or layer 2
What 3 things happen on layer 3 of the OSI and TCP/IP network models? - Answer a.)Network provides
connectivity between two hosts on geographically separated networks
b.)selects the best path for data delivery
c.)routes data packets
True or False: DHCP snooping can mitigate a DHCP attack. - Answer True: DHCP snooping can mitigate a
DHCP attack by using a Cisco switch.
After encryption has been applied to a message, what is the message identified as? - Answer
Ciphertext
What does policy NAT - Answer It enables a firewall to perform translations based on a destination
address
,what type of NAT is used for setting up public servers with a one to one relationship? - Answer Static
NAT
what type of cypher arranges or permutates letters? - Answer transposition
what is the type of malware masquerading as a legitimate software, but is malicious when launched? -
Answer trojan
What can be used to determine the type of OS the device is running that can be found within ICMP? -
Answer TTL value
On a multi-layer switch what does the TCAM table do? - Answer this table handles the fowarding of
data with regards to ACLs
The CAM table and the MAC table do what? - Answer identify a MAC address to a port
what is the preferred symmetrical algorithm to replace 3DES? - Answer AES
which OSI model layer is responsible for logical addressing and path selection networks? - Answer
Layer 3
Which form of NAT uses port addresses to distinguish between translated sessions? - Answer Dynamic
PAT , PATs always use ports
What utility can an attacker use to scan the a network in stealth mode? - Answer nmap
what phase of the TCP process is affected by a TCP reset attack? - Answer connection established. the
reset is the part when the communication is being shut down so the attack would falsify a TCP reset
which would cause the connection established phase to drop.
During a TCP SYN flood attack, what phase of the TCP communication process is attacked? - Answer
three-way handshake
, What protocol uses UDP to manage and monitor devices the could be exploited if not secured? - Answer
SNMP ( this is dead :security is not my problem)
What is the well known port of the DNS TCP zone-transfer? - Answer 53
How many bits does an IPv6 address have? - Answer 128
what is the first standard for Spanning Tree that was modeled after Radia Perlmans work while at DEC? -
Answer 802.1D "I have never seen a graph as lovely as a tree"-Radia Perlmans. 802.1D is the first
instance of Spanning Tree
What is the name of Layer 3 of the TCP/ IP model? - Answer The Internet layer
Which field in the IP header is decremented by every router it passes through? - Answer TTL
What TCP port does SSL/ TLS commonly use? - Answer TCP 443
Name the key difference between a MITM attack and an eavesdropping attack. - Answer MITM can
capture data AND can modify the data in transit
Which routing protcol is EIGRP? - Answer advanced distance vector, distance vector is for IGRP
Why would you use a hash algorithm for a message? - Answer Integrity. It guarantees data is not being
modified in transit
what device operates strictly at the physical layer? - Answer Hub
what does "key space" refer to in regards to cryptography? - Answer the number of possible keys
generated by an algorithm